Authenticity control of relational databases by means of lossless watermarking based on circular histogram modulation

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we adapt the reversible watermarking modulation originally proposed by De Vleeschouwer et al. for images to the protection of relational databases. Message embedding is achieved by modulating the relative angular position of the circular histogram center of mass of one numerical attribute. It is fragile and can be used for database authentication. Beyond the application framework, we theoretically evaluate the performance of our scheme in terms of distortion and capacity. We further experimentally verify these theoretical limits within the framework of one medical database of more than one million of inpatient hospital stay records. We show that under the central limit theorem assumptions, experimental results fit theory. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Franco-Contreras, J., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., & Roux, C. (2013). Authenticity control of relational databases by means of lossless watermarking based on circular histogram modulation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8203 LNCS, pp. 207–222). https://doi.org/10.1007/978-3-642-41098-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free